首页 > 最新文献

2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)最新文献

英文 中文
Quality of Service in Wireless Sensor Networks using Cellular Learning Automata 基于元胞学习自动机的无线传感器网络服务质量研究
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231123
Z. Alansari, N. B. Anuar, A. Kamsin, M. R. Belgaum, S. Soomro
Wireless Sensor Networks (WSNs) have different Quality of Service (QoS) parameters from those of traditional networks. Several considerations utilized for evaluating QoS include appropriate number of active nodes, network lifetime, network coverage, and resource utilization. One of the features of Cellular Learning Automata (CLA), besides its simple learning structure, is learning in distributed and multi-hop environments with limited communications and incomplete information. CLA benefit show how different problems in WSNs can be overcome. In this paper, the underlying issues of WSNs are discussed, and in order to improve the QoS parameters, efficient solutions have been proposed using CLA. The WSN 's environmental coverage issue is also addressed by turning off redundant nodes and maintaining adequate nodes to conserve resources and enhance network life. In this research, the issue of clustering of WSNs is addressed and the WSNs are clustered by using CLA to efficiently distribute energy to the network and maximize network life. All provided methods are simulated by J-Sim tools showing the overall reduce in WSN energy consumption and also for each node alone. Moreover, we demonstrate the reduce in data communication overhead and maintaining the overall network coverage. Simulation experiments indicate higher performance of the proposed methods than other associated approaches.
无线传感器网络的服务质量(QoS)参数与传统网络不同。用于评估QoS的几个考虑因素包括活动节点的适当数量、网络生命周期、网络覆盖范围和资源利用率。细胞学习自动机(Cellular Learning Automata, CLA)除了学习结构简单外,还具有在通信有限、信息不完全的分布式多跳环境下学习的特点。CLA效益显示了如何克服无线传感器网络中的不同问题。本文讨论了无线传感器网络的基本问题,并提出了利用CLA改进其QoS参数的有效解决方案。WSN的环境覆盖问题也通过关闭冗余节点和维护足够的节点来解决,以节约资源和提高网络寿命。本研究解决了无线传感器网络的聚类问题,利用CLA对无线传感器网络进行聚类,有效地将能量分配到网络中,使网络寿命最大化。所有提供的方法都通过J-Sim工具进行了模拟,显示了WSN能耗的总体降低以及每个节点单独的能耗降低。此外,我们还演示了数据通信开销的减少和保持整个网络覆盖。仿真实验表明,该方法的性能优于其他相关方法。
{"title":"Quality of Service in Wireless Sensor Networks using Cellular Learning Automata","authors":"Z. Alansari, N. B. Anuar, A. Kamsin, M. R. Belgaum, S. Soomro","doi":"10.1109/iCCECE49321.2020.9231123","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231123","url":null,"abstract":"Wireless Sensor Networks (WSNs) have different Quality of Service (QoS) parameters from those of traditional networks. Several considerations utilized for evaluating QoS include appropriate number of active nodes, network lifetime, network coverage, and resource utilization. One of the features of Cellular Learning Automata (CLA), besides its simple learning structure, is learning in distributed and multi-hop environments with limited communications and incomplete information. CLA benefit show how different problems in WSNs can be overcome. In this paper, the underlying issues of WSNs are discussed, and in order to improve the QoS parameters, efficient solutions have been proposed using CLA. The WSN 's environmental coverage issue is also addressed by turning off redundant nodes and maintaining adequate nodes to conserve resources and enhance network life. In this research, the issue of clustering of WSNs is addressed and the WSNs are clustered by using CLA to efficiently distribute energy to the network and maximize network life. All provided methods are simulated by J-Sim tools showing the overall reduce in WSN energy consumption and also for each node alone. Moreover, we demonstrate the reduce in data communication overhead and maintaining the overall network coverage. Simulation experiments indicate higher performance of the proposed methods than other associated approaches.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"29 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132271788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Transmission and Repository Platform for Electronic Medical Images: Case Study of Retinal Fundus in Teleophthalmology 电子医学图像的安全传输与存储平台:远距眼科视网膜眼底案例研究
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231144
Soha M Gamal, S. Youssef, Ayman A. Abdel-Hamid
Securing electronic medical information has a significant impact on data access which directly affects patient’s privacy and quality care rights. Medical professionals need to have full access to all patients' medical history to make accurate decisions regarding diagnosis and treatment plans. This paper introduces a novel Secure framework that integrates a new hybrid encryption scheme of medical images using chaotic maps and 2D Discrete wavelet transform (DWT) Steganography to increase key size and achieve high security level. In addition, a web-based monitoring platform has been deployed for tracking of electronic medical records during transmission. To validate the efficiency of the proposed framework, an application case-study has been introduced for securely transmitting retinal fundus medical images for diagnostic decisions on diabetic patients. Compared to the state-of-the-art approaches, the proposed framework demonstrated the ability to mask the context of the confidential patient into a transmitted cover image with high imperceptibility and limited degradation in the stego image provided in acceptable cryptographic overhead. Experimental results demonstrated that the proposed framework outperforms other schemes in terms of accuracy, sensitivity and perceptibility.
确保电子医疗信息的安全对数据访问产生重大影响,直接影响到患者的隐私和优质护理权利。医疗专业人员需要充分了解所有患者的病史,以便就诊断和治疗计划做出准确的决定。本文介绍了一种新的安全框架,该框架集成了一种新的混合加密方案,利用混沌映射和二维离散小波变换(DWT)隐写技术对医学图像进行加密,以增加密钥大小并达到较高的安全性。此外,还部署了一个基于网络的监测平台,用于在传输过程中跟踪电子病历。为了验证该框架的有效性,本文介绍了一个用于糖尿病患者诊断决策的安全传输视网膜眼底医学图像的应用案例研究。与最先进的方法相比,所提出的框架证明了将机密患者的背景掩盖为传输的掩护图像的能力,该图像具有高度的不可感知性,并且在可接受的加密开销下提供了隐写图像的有限退化。实验结果表明,该框架在准确性、灵敏度和可感知性方面优于其他方案。
{"title":"Secure Transmission and Repository Platform for Electronic Medical Images: Case Study of Retinal Fundus in Teleophthalmology","authors":"Soha M Gamal, S. Youssef, Ayman A. Abdel-Hamid","doi":"10.1109/iCCECE49321.2020.9231144","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231144","url":null,"abstract":"Securing electronic medical information has a significant impact on data access which directly affects patient’s privacy and quality care rights. Medical professionals need to have full access to all patients' medical history to make accurate decisions regarding diagnosis and treatment plans. This paper introduces a novel Secure framework that integrates a new hybrid encryption scheme of medical images using chaotic maps and 2D Discrete wavelet transform (DWT) Steganography to increase key size and achieve high security level. In addition, a web-based monitoring platform has been deployed for tracking of electronic medical records during transmission. To validate the efficiency of the proposed framework, an application case-study has been introduced for securely transmitting retinal fundus medical images for diagnostic decisions on diabetic patients. Compared to the state-of-the-art approaches, the proposed framework demonstrated the ability to mask the context of the confidential patient into a transmitted cover image with high imperceptibility and limited degradation in the stego image provided in acceptable cryptographic overhead. Experimental results demonstrated that the proposed framework outperforms other schemes in terms of accuracy, sensitivity and perceptibility.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of an IT security measurement method for the evaluation of IT security in micro-enterprises 微型企业IT安全评价的IT安全度量方法实现
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231113
M. Heidenreich
This paper presents a proposal for an application-oriented implementation of an existing multidimensional IT security measurement method. The result is a software tool (IT-Tool) which is used to measure the internal and external perspective on the IT security of an enterprise. The measured values are being classified with the help of a defined metric into different IT security levels. The aim of the self-measurement IT-Tool is to increase the IT security awareness of the enterprise by comparing the internal and external perspective as well as to derive concrete measures to improve the IT security of the enterprise. The entire IT security measurement method is based on the multiple German industry IT security framework conditions and is initially designed for craftwork micro-enterprises (1 – 9 employees). In addition, a suggestion for the evaluation of the tool presented here is described.
本文提出了一种现有的多维IT安全度量方法的面向应用的实现方案。其结果是一个软件工具(IT- tool),用于度量企业IT安全的内部和外部视角。在定义的度量标准的帮助下,测量值被划分为不同的IT安全级别。self-measurement IT- tool的目的是通过比较内部和外部的角度来提高企业的IT安全意识,并得出提高企业IT安全的具体措施。整个IT安全度量方法基于多个德国行业IT安全框架条件,最初是为工艺型微型企业(1 - 9名员工)设计的。此外,本文还描述了对该工具进行评估的建议。
{"title":"Implementation of an IT security measurement method for the evaluation of IT security in micro-enterprises","authors":"M. Heidenreich","doi":"10.1109/iCCECE49321.2020.9231113","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231113","url":null,"abstract":"This paper presents a proposal for an application-oriented implementation of an existing multidimensional IT security measurement method. The result is a software tool (IT-Tool) which is used to measure the internal and external perspective on the IT security of an enterprise. The measured values are being classified with the help of a defined metric into different IT security levels. The aim of the self-measurement IT-Tool is to increase the IT security awareness of the enterprise by comparing the internal and external perspective as well as to derive concrete measures to improve the IT security of the enterprise. The entire IT security measurement method is based on the multiple German industry IT security framework conditions and is initially designed for craftwork micro-enterprises (1 – 9 employees). In addition, a suggestion for the evaluation of the tool presented here is described.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
iCCECE 2020 Cover Page iCCECE 2020封面
Pub Date : 2020-08-17 DOI: 10.1109/iccece49321.2020.9231048
{"title":"iCCECE 2020 Cover Page","authors":"","doi":"10.1109/iccece49321.2020.9231048","DOIUrl":"https://doi.org/10.1109/iccece49321.2020.9231048","url":null,"abstract":"","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Perturbation Methods for Moderator and Doppler Temperature Coefficients in the European Pressurised Reactor Core Analysis 欧洲压堆堆芯分析中慢化剂和多普勒温度系数的计算摄动方法
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231053
Jinfeng Li
Moderator temperature coefficient (MTC) and fuel Doppler temperature coefficient (DTC) are both the key reactivity coefficients for the safety assessment of a nuclear fission reactor core. Conventional unidirectional perturbing computation exhibits a limited scope in understanding the full-core physics. To better assist the energy policy decision making, this work contributes two different perturbation approaches to characterise the temperature coefficients of reactivity, i.e. by perturbing the moderator (or fuel) temperature while keeping the core power, or by perturbing the power while keeping the moderator (or fuel) temperature. Multi-physics computational codes suite (WIMS-PANTHER-Serpent) is employed to simulate and benchmark the startup core behavior of a nuclear new build currently occurring in the UK. Reasonably good agreements with the nuclear reactor physics are demonstrated computationally for both perturbation methods.
慢化剂温度系数(MTC)和燃料多普勒温度系数(DTC)都是核裂变堆芯安全评价的关键反应性系数。传统的单向摄动计算在理解全核物理方面表现出有限的范围。为了更好地辅助能源政策决策,本研究提出了两种不同的扰动方法来表征反应性的温度系数,即在保持堆芯功率的同时扰动慢化剂(或燃料)温度,或在保持慢化剂(或燃料)温度的同时扰动功率。多物理场计算代码套件(wwin - panther - serpent)用于模拟和基准测试当前在英国发生的新核构建的启动核心行为。计算结果表明,这两种微扰方法与核反应堆物理特性相当吻合。
{"title":"Computational Perturbation Methods for Moderator and Doppler Temperature Coefficients in the European Pressurised Reactor Core Analysis","authors":"Jinfeng Li","doi":"10.1109/iCCECE49321.2020.9231053","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231053","url":null,"abstract":"Moderator temperature coefficient (MTC) and fuel Doppler temperature coefficient (DTC) are both the key reactivity coefficients for the safety assessment of a nuclear fission reactor core. Conventional unidirectional perturbing computation exhibits a limited scope in understanding the full-core physics. To better assist the energy policy decision making, this work contributes two different perturbation approaches to characterise the temperature coefficients of reactivity, i.e. by perturbing the moderator (or fuel) temperature while keeping the core power, or by perturbing the power while keeping the moderator (or fuel) temperature. Multi-physics computational codes suite (WIMS-PANTHER-Serpent) is employed to simulate and benchmark the startup core behavior of a nuclear new build currently occurring in the UK. Reasonably good agreements with the nuclear reactor physics are demonstrated computationally for both perturbation methods.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Automatic Detection of COVID-19 from Chest X-ray Images with Convolutional Neural Networks 基于卷积神经网络的胸部x线图像COVID-19自动检测
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231235
Khandaker Foysal Haque, Fatin Farhan Haque, L. Gandy, A. Abdelgawad
Deep Learning has improved multi-fold in recent years and it has been playing a great role in image classification which also includes medical imaging. Convolutional Neural Networks (CNN) has been performing well in detecting many diseases including Coronary Artery Disease, Malaria, Alzheimer’s disease, different dental diseases, and Parkinson’s disease. Like other cases, CNN has a substantial prospect in detecting COVID-19 patients with medical images like chest X-rays and CTs. Coronavirus or COVID-19 has been declared a global pandemic by the World Health Organization (WHO). Till July 11, 2020, the total COVID-19 confirmed cases are 12.32 M and deaths are 0.556 M worldwide. Detecting Corona positive patients is very important in preventing the spread of this virus. On this conquest, a CNN model is proposed to detect COVID-19 patients from chest X-ray images. This model is evaluated with a comparative analysis of two other CNN models. The proposed model performs with an accuracy of 97.56% and a precision of 95.34%. This model gives the Receiver Operating Characteristic (ROC) curve area of 0.976 and F1-score of 97.61. It can be improved further by increasing the dataset for training the model.
近年来,深度学习得到了多方面的改进,在图像分类领域发挥了巨大的作用,其中也包括医学成像。卷积神经网络(CNN)在检测冠状动脉疾病、疟疾、阿尔茨海默病、各种牙齿疾病、帕金森病等多种疾病方面表现良好。与其他病例一样,CNN在通过胸部x光和ct等医学图像检测COVID-19患者方面具有很大的前景。世界卫生组织(WHO)宣布新冠肺炎(COVID-19)为全球大流行。截至2020年7月11日,全球新冠肺炎确诊病例总数为1232万例,死亡人数为0.556万例。检测冠状病毒阳性患者对于预防该病毒的传播非常重要。在此基础上,提出了一种从胸部x线图像中检测COVID-19患者的CNN模型。该模型与另外两个CNN模型的对比分析进行了评估。该模型的准确率为97.56%,精密度为95.34%。该模型的受试者工作特征(ROC)曲线面积为0.976,f1评分为97.61。可以通过增加训练模型的数据集来进一步改进。
{"title":"Automatic Detection of COVID-19 from Chest X-ray Images with Convolutional Neural Networks","authors":"Khandaker Foysal Haque, Fatin Farhan Haque, L. Gandy, A. Abdelgawad","doi":"10.1109/iCCECE49321.2020.9231235","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231235","url":null,"abstract":"Deep Learning has improved multi-fold in recent years and it has been playing a great role in image classification which also includes medical imaging. Convolutional Neural Networks (CNN) has been performing well in detecting many diseases including Coronary Artery Disease, Malaria, Alzheimer’s disease, different dental diseases, and Parkinson’s disease. Like other cases, CNN has a substantial prospect in detecting COVID-19 patients with medical images like chest X-rays and CTs. Coronavirus or COVID-19 has been declared a global pandemic by the World Health Organization (WHO). Till July 11, 2020, the total COVID-19 confirmed cases are 12.32 M and deaths are 0.556 M worldwide. Detecting Corona positive patients is very important in preventing the spread of this virus. On this conquest, a CNN model is proposed to detect COVID-19 patients from chest X-ray images. This model is evaluated with a comparative analysis of two other CNN models. The proposed model performs with an accuracy of 97.56% and a precision of 95.34%. This model gives the Receiver Operating Characteristic (ROC) curve area of 0.976 and F1-score of 97.61. It can be improved further by increasing the dataset for training the model.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Coronary Artery Disease Detection from PCG signals using Time Domain based Automutual Information and Spectral Features 基于时域自动信息和频谱特征的PCG信号冠状动脉疾病检测
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231107
Sagar Suresh Kumar, V. K
This paper proposes a quick, compact and cost-effective point-of-care stethoscope-based device that detects Coronary Artery Disease (CAD) from phonocardiogram (PCG) signals, i.e. Recordings of heart sounds, compared to existing methods which are either expensive or are unable to diagnose until the conditions too severe. PCG signals are extracted from patients using a condenser microphone mounted on a stethoscope and is followed by amplification and filtering. The signals are passed through the laptop using an audio jack and digitized. Thereafter they are segmented into the 4 states S1, systole, S2 and diastole using a Hidden Semi Markov Model (HSMM). Afterwards, the diastolic phases are isolated and both time and frequency domain features are analyzed. In the time domain, features are extracted using a nonlinear function, the Automutual Information. In the frequency domain, both high and low-frequency domain features were extracted. A Support Vector Classifier using a Radial Basis Function was trained on 190 recordings from the 2016 PhysioNet/Cinc challenge and obtained an accuracy of 0.74, indicating the combined use of both time and frequency measures from PCG signals could be viable. Such a product could be of great use to clinicians as a quick, inexpensive and primary means of checking whether or not a patient has CAD.
本文提出了一种快速,紧凑和具有成本效益的基于听诊器的设备,该设备可以从心音图(PCG)信号(即心音记录)中检测冠状动脉疾病(CAD),而现有的方法要么昂贵,要么无法诊断,直到病情过于严重。使用安装在听诊器上的电容式麦克风从患者身上提取PCG信号,然后进行放大和滤波。信号通过音频插孔通过笔记本电脑并进行数字化。然后利用隐半马尔可夫模型(HSMM)将其划分为S1、收缩期、S2和舒张期4种状态。然后对舒张相进行分离,分析其时域和频域特征。在时域,使用非线性函数自动信息提取特征。在频域,提取高、低频域特征。使用径向基函数的支持向量分类器在2016年PhysioNet/Cinc挑战赛的190个记录上进行了训练,获得了0.74的准确率,这表明结合使用PCG信号的时间和频率测量是可行的。这种产品对临床医生来说是一种快速、廉价和主要的检查病人是否患有CAD的方法。
{"title":"Coronary Artery Disease Detection from PCG signals using Time Domain based Automutual Information and Spectral Features","authors":"Sagar Suresh Kumar, V. K","doi":"10.1109/iCCECE49321.2020.9231107","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231107","url":null,"abstract":"This paper proposes a quick, compact and cost-effective point-of-care stethoscope-based device that detects Coronary Artery Disease (CAD) from phonocardiogram (PCG) signals, i.e. Recordings of heart sounds, compared to existing methods which are either expensive or are unable to diagnose until the conditions too severe. PCG signals are extracted from patients using a condenser microphone mounted on a stethoscope and is followed by amplification and filtering. The signals are passed through the laptop using an audio jack and digitized. Thereafter they are segmented into the 4 states S1, systole, S2 and diastole using a Hidden Semi Markov Model (HSMM). Afterwards, the diastolic phases are isolated and both time and frequency domain features are analyzed. In the time domain, features are extracted using a nonlinear function, the Automutual Information. In the frequency domain, both high and low-frequency domain features were extracted. A Support Vector Classifier using a Radial Basis Function was trained on 190 recordings from the 2016 PhysioNet/Cinc challenge and obtained an accuracy of 0.74, indicating the combined use of both time and frequency measures from PCG signals could be viable. Such a product could be of great use to clinicians as a quick, inexpensive and primary means of checking whether or not a patient has CAD.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iris Recognition Performance Analysis for Noncooperative Conditions 非合作条件下虹膜识别性能分析
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231089
Oktay Koç, A. Uka, Maaruf Ali, Klevis Muda, Orges Balla, Albana Roci
A biometric system is presented using the human iris to help determine the authenticity of an individual. The system extracts the unique features of the iris that are recorded in templates. These templates are then compared with other irides utilising Daugman’s method. This follows a strict procedure (including segmentation, normalization, encoding and matching) over which a user has complete control. Often the recognition phase is crucial in nonoptimal or noncooperative conditions. In this work, a comparison is made of the relative accuracy of utilizing noisy iris datasets. The performance is analysed for a different number of iris images per person, for different number of individuals, for different noise levels using three different segmentations and three different encoding schemes. Adjustment of the Gabor filters’ bandwidth used in the encoding stage proves to be decisive in improving the accuracy for higher noise levels.
提出了一种生物识别系统,利用人的虹膜来帮助确定个人的真实性。系统提取记录在模板中的虹膜的唯一特征。然后利用道格曼的方法将这些模板与其他虹膜进行比较。这遵循一个严格的程序(包括分割,规范化,编码和匹配),用户可以完全控制。通常在非最优或非合作条件下,识别阶段是至关重要的。在这项工作中,比较了利用有噪声虹膜数据集的相对精度。使用三种不同的分割和三种不同的编码方案,对每个人不同数量的虹膜图像、不同数量的个体、不同的噪声水平进行了性能分析。在编码阶段调整Gabor滤波器的带宽对提高高噪声水平下的精度起着决定性的作用。
{"title":"Iris Recognition Performance Analysis for Noncooperative Conditions","authors":"Oktay Koç, A. Uka, Maaruf Ali, Klevis Muda, Orges Balla, Albana Roci","doi":"10.1109/iCCECE49321.2020.9231089","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231089","url":null,"abstract":"A biometric system is presented using the human iris to help determine the authenticity of an individual. The system extracts the unique features of the iris that are recorded in templates. These templates are then compared with other irides utilising Daugman’s method. This follows a strict procedure (including segmentation, normalization, encoding and matching) over which a user has complete control. Often the recognition phase is crucial in nonoptimal or noncooperative conditions. In this work, a comparison is made of the relative accuracy of utilizing noisy iris datasets. The performance is analysed for a different number of iris images per person, for different number of individuals, for different noise levels using three different segmentations and three different encoding schemes. Adjustment of the Gabor filters’ bandwidth used in the encoding stage proves to be decisive in improving the accuracy for higher noise levels.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116510657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Cybersecurity Challenges and Awareness for Children of all Ages 各年龄段儿童网络安全挑战与意识调查
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231229
Zeeshan Siddiqui, Nida Zeeshan
Children are considered an easy prey to many cybersecurity threats. This is due to the lack of awareness of such threats while using smart devices, like smartphones. In most of the cases, not only children but their parents are also unaware of these security threats. Therefore, in this research, we have performed a comprehensive survey on various aspects of cybersecurity threats and its awareness among children. Such as, online safety and security for children, security control challenges and cybersecurity challenges for children and parents. We have also performed a security test to demonstrate the effectiveness of built-in security and privacy settings of such devices. For this purpose, we have used the built-in security and privacy settings of an iPhone 11 and performed various usage tests on unrestricted and restricted mode. The tests and observations have proved that the built-in security and privacy controls, such as Screen Time or Parental Controls, are the most effective way to safeguard children from various Cybersecurity threats they may face during their use of such devices and lack of cybersecurity awareness.
儿童被认为是许多网络安全威胁的容易受害者。这是由于在使用智能手机等智能设备时缺乏对此类威胁的意识。在大多数情况下,不仅孩子,他们的父母也不知道这些安全威胁。因此,在本研究中,我们对网络安全威胁的各个方面及其在儿童中的意识进行了全面的调查。例如,儿童的网络安全、安全控制挑战、儿童和家长的网络安全挑战。我们还进行了安全测试,以证明此类设备内置安全和隐私设置的有效性。为此,我们使用了iPhone 11内置的安全和隐私设置,并在无限制和受限模式下进行了各种使用测试。测试和观察证明,内置的安全和隐私控制,如屏幕时间或家长控制,是保护儿童免受各种网络安全威胁的最有效方式,他们在使用这些设备和缺乏网络安全意识时可能面临这些威胁。
{"title":"A Survey on Cybersecurity Challenges and Awareness for Children of all Ages","authors":"Zeeshan Siddiqui, Nida Zeeshan","doi":"10.1109/iCCECE49321.2020.9231229","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231229","url":null,"abstract":"Children are considered an easy prey to many cybersecurity threats. This is due to the lack of awareness of such threats while using smart devices, like smartphones. In most of the cases, not only children but their parents are also unaware of these security threats. Therefore, in this research, we have performed a comprehensive survey on various aspects of cybersecurity threats and its awareness among children. Such as, online safety and security for children, security control challenges and cybersecurity challenges for children and parents. We have also performed a security test to demonstrate the effectiveness of built-in security and privacy settings of such devices. For this purpose, we have used the built-in security and privacy settings of an iPhone 11 and performed various usage tests on unrestricted and restricted mode. The tests and observations have proved that the built-in security and privacy controls, such as Screen Time or Parental Controls, are the most effective way to safeguard children from various Cybersecurity threats they may face during their use of such devices and lack of cybersecurity awareness.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SoC FPGA-based Beacon Emulator Platform for a Three-Axis Satellite Antenna 基于SoC fpga的三轴卫星天线信标仿真平台
Pub Date : 2020-08-17 DOI: 10.1109/iCCECE49321.2020.9231170
Lucas Conde, Gustavo Souza, Yuri Souza, Flávio R. S. Nunes, M. Takeda, Adalbery R. Castro, A. Klautau
Satellite tracking techniques are constantly being developed and improved so that stable communication links between satellites and terrestrial stations can be established. However, the implementation of such techniques can be frequently limited due to the complexity in reproducing satisfying test scenarios, manipulating and interpreting signals from those systems. Therefore, this paper proposes a method to manipulate the power signals of a three-phase induction motor (responsible for the movement of an antenna in a satellite tracking system) in order to apply them to a system able to emulate the behavior of the beacon signal (the reference signal for satellites). For that, the hardware project of a beacon and limit switches (LSs) emulators, motor rotation frequency meters, and rotation direction detectors will be presented. This was implemented in a System-on-Chip (SoC) FPGA (Field Programmable Gate Array) platform. The described system enables hardware-in-the-loop simulations and the efficient assessment of satellite tracking algorithms.
正在不断发展和改进卫星跟踪技术,以便在卫星和地面站之间建立稳定的通信联系。然而,由于再现令人满意的测试场景、操纵和解释来自这些系统的信号的复杂性,这种技术的实现经常会受到限制。因此,本文提出了一种方法来操纵三相感应电动机的功率信号(负责卫星跟踪系统中天线的运动),以便将它们应用于能够模拟信标信号(卫星的参考信号)行为的系统。为此,给出了信标和限位开关仿真器、电机旋转频率计和旋转方向检测器的硬件方案。这是在片上系统(SoC) FPGA(现场可编程门阵列)平台上实现的。所描述的系统使硬件在环仿真和卫星跟踪算法的有效评估成为可能。
{"title":"SoC FPGA-based Beacon Emulator Platform for a Three-Axis Satellite Antenna","authors":"Lucas Conde, Gustavo Souza, Yuri Souza, Flávio R. S. Nunes, M. Takeda, Adalbery R. Castro, A. Klautau","doi":"10.1109/iCCECE49321.2020.9231170","DOIUrl":"https://doi.org/10.1109/iCCECE49321.2020.9231170","url":null,"abstract":"Satellite tracking techniques are constantly being developed and improved so that stable communication links between satellites and terrestrial stations can be established. However, the implementation of such techniques can be frequently limited due to the complexity in reproducing satisfying test scenarios, manipulating and interpreting signals from those systems. Therefore, this paper proposes a method to manipulate the power signals of a three-phase induction motor (responsible for the movement of an antenna in a satellite tracking system) in order to apply them to a system able to emulate the behavior of the beacon signal (the reference signal for satellites). For that, the hardware project of a beacon and limit switches (LSs) emulators, motor rotation frequency meters, and rotation direction detectors will be presented. This was implemented in a System-on-Chip (SoC) FPGA (Field Programmable Gate Array) platform. The described system enables hardware-in-the-loop simulations and the efficient assessment of satellite tracking algorithms.","PeriodicalId":413847,"journal":{"name":"2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1